Re: make update stores twice the packages

2008-09-06 Thread macintoshzoom

Hi Ben Calvert,

Ben Calvert wrote:

On Aug 28, 2008, at 1:36 PM, Stuart Henderson wrote:




I don't think they are links, they are real copies. I am checking this
with konqueror as su and it show clearly when the file is a link
or a real file.


That's not a good way to check. Try ls(1).



It's likely that he doesn't know the difference between a soft and hard 
link.


I'm very busy so I am not currently checking my threads, till next week 
t least.

But I have just accidentally read your (this) posting.

I am quickly learning more about soft and hard links, and there is a 
thread at kde-dev to create a patch for konqueror (+ kdedirstats + other 
KDE tools) to avoid confusing people when dealing with files hard linked 
to different folders (as crazily OpenBSD does in the /usr/ports/packages 
folder ), which happened to me causing an erroneously information about 
my system space getting eaten by ghost duplicated files.


mac - you need a basic unix book.  for now, read man ln


man ln on my night sleep table, as some unix pdf books I found online as
Introduction to Unix 1998 by Frank G. Fiamingo
and
Unix for Dummies - 2004 - Wiley Publishing

Any advice here?

Mac.



You may wish to add /usr/local/jdk-1.7.0/man to /etc/man.conf ?

2008-08-15 Thread macintoshzoom

how?

jdk-1.7.0.00b24p2: complete
--- jdk-1.7.0.00b24p2 ---
You may wish to add /usr/local/jdk-1.7.0/man to /etc/man.conf



Not updating .libs1-gettext-0.16.1, remember to clean it

2008-08-15 Thread macintoshzoom

how?



Re: pkg_add and make via tor?

2008-08-03 Thread macintoshzoom
Hi,

Stuart Henderson wrote:
 On 2008-08-02, macintoshzoom [EMAIL PROTECTED] wrote:
 I need an alternative to the default system fetch ftp used by pkg_add,
 something that could be socksified via dsocks, or that accepts to run
 through a socks server, e.g. FETCH_CMD=dsocks-torify.sh
 newsocksifiableftp, and that understands
 ${FETCH_CMD} -o - url (as per man pkg_add)

 Any one had success here?
 
 For normal pkg_add, try curl.
 
 I want to run pkg_add -u routed via my (only) exit socks 4a/5 proxy
 server (tor).
 
 But iirc, you won't be able to pkg_add -u with curl.

This is a must, I need pkg_add -u via tor.
..?
 
 Not sure what's up with ftp(1). First time I tried it, making a
 transfer via the ftp CLI, connecting through ssh -D1080 / dsocks,
 it transferred a file through socks, but then hanged at the end.
 If I try again, it just connects directly. Very odd...



pkg_add and make via tor?

2008-08-02 Thread macintoshzoom
I need an alternative to the default system fetch ftp used by pkg_add,
something that could be socksified via dsocks, or that accepts to run
through a socks server, e.g. FETCH_CMD=dsocks-torify.sh
newsocksifiableftp, and that understands
${FETCH_CMD} -o - url (as per man pkg_add)

Any one had success here?

I want to run pkg_add -u routed via my (only) exit socks 4a/5 proxy
server (tor).
(dsocks-torify.sh ftp don't work)

Can you help me?

Thanks.

Mac



how to undelete?

2008-07-07 Thread macintoshzoom
I deleted a directory from an OpenBSD slice from my 2nd HD, and I need
to recover a single file.

I tried : http://myutil.com/2008/1/15/undelete-unrm-for-openbsd-4-2-with-dls
but  failed :

# dls /dev/wd1x  /xxx/xx/undelete.bin
Sector offset supplied is larger than disk image (maximum: 0)

Help  thanks.



Re: how to undelete?

2008-07-07 Thread macintoshzoom
Which hex editor do you advise?
Should I have to umount the partition before?
the partition is 40 GB size on a secondary disk, OpenBSD old slice,
should I need at least such space (/tmp ?) to open it on the hex editor
from my OpenBSD 4.3?

Thanks!

Die Gestalt wrote:
 Just open your disk in a hex editor and look for your data, it should be here.



Re: Any offshore OpenBSD hosting?

2008-06-18 Thread macintoshzoom
Hey,

Your postings on this subject are interesting, it seems you know about what
your are talking about.

What should be your summary global advice for creating an hosting offshore
corporation/foundation to help human right watchers and activists, say as eg
Greenpeace, hrw.org , tibetans, chinesse/asian free speech/democacy activists,
and the like?.
If we are able to provide these communities with strong
privacy-security-enhanced turnkey hosting services, individials, corporations,
foundations will become also interested to adhere (or to order, if we go on
business)our hosting system(s) and services...

There are other considerations to implement in the hosting servers and
customers PC's to help against Big Brother(s), as it's the software (and OS):
Here OpenBSD can help a lot as the OS of choice, but it requires yet a lot of
implementations and tricky configurations.
To be implemented: Fully encryption of the OS boxes (a-la drivecrypt /
compusec), also encrypting (eventually on fake video-music file containers for
stegaqnography?) the users space via OTF-like (truecrypt?) encryption,
including one or more layers of denial plausibility with fake/honey-pots areas
if server maintainers or hosted customers are eventually forced (or hacked) to
reveal their pass keys.
The hoster company should never be able to decrypt the hosted customers
content, its their matter and their privacy.

A new kind of secureprivate hosting standard should be created, e.g  to
force the use of only strong SSL for browsing and e-mail/webmail, and allowing
only gpg protected communications on specific or aproved-verified secured
pre-configured software clients.
And networking ONLY on gateways as tor, i2p, mixminion, jap, freenet or
similar systems.
And etc etc...
I can't understand why everyone still gives their websites on (weak/cleartext)
http, instead of using strong https that should be the standard. Most if not
all of the current PC boxes and bandwiths allow this, or not?. Why is https
only used for banking, order former and the like, and not for everything?

All this seems a lot of job (we all are working on that), but once done it can
set up a new standard(s) for data and communications privacy ( a new standard
that can/should have its own brand name) not only for individuals but also for
corporations (industrial and commercial secrets theft causes billions loses),
govs.

We believe that this is an essential feature for a fair world and to reach a
new degree of civilization, justice, equity and fraternity (if we can avoid to
extinguish the humanity in the meantime): Information and association of the
masses is a very powerful power.
If and when you can freely communicate with everyone at the last desert
village inhabitants in deep Africa, if and when a global worldwide individual
can learn, know, opine and vote, then there will be a new kind of planet lobby
from the masses against any ill-minded government, corporation, money or
justice laws that can change the world in decades.
And there are enough goods and resources in earth for all to leave in peace;
someone is tricking us the wrong way.
Here the OLPC (one laptop per children, wifi connected and solar/handcrank
powered) is a good step (we are working also on an OpenBSD based version suite
to fit on these as an alternate of the standard software (probably
bigbro-dirty as not-privacy secured at all) .

Of course, a super-secure information/communication/privacy system will help
also criminals and ill-minded likes, but we must fight against them not at the
price of losing our freespeech nor robbing the freespeech (nor the planet) of
our childs, that are the real owners of the world.

macintoshzoom
---
On Wed, 18 Jun 2008 13:29:29 +
[EMAIL PROTECTED] wrote:

  But if ISP's must have blackbox on their interfaces (hello FBI),than you
can't
  trust your local hosting company even if they are very friendly ;-)

 Cisco prefers a blueish-black color. Juniper boxes tend to be white and
blue.

 In most Western countries there are many ISPs; if many of them were forced
to have, in secret, black boxes on their networks, it would soon be public
that that is occuring.

 Providers are, in many cases, being forced to allow, unmonitored, snooping
by their governments - read up on CALEA. Hardware based routing platforms will
be able to handle only a very small amount of traffic, the CPUs that are used
in them tend to be very slow and even the fastest CPUs can route only a tiny
amount of the traffic modern hardware-based routers can.

 So, if the government wants to monitor YOU specifically, or occasionally
monitor everyone, they might be able to do it via CALEA.

 If I wished to monitor a large amount of peoples traffic (not all - that's
not technically feasible), I would try and use passive taps with the
cooperation of major transit providers. If I was on a smaller budget, then I
would just do that with some major telcos

Any offshore OpenBSD hosting?

2008-06-17 Thread macintoshzoom
Does anyone knows about any offshore OpenBSD dedicated hosting : Asia, PanamC!, 
honest and privacy conscious hosting services?
It seems that as per today it's better to go offshore for a hosting business to 
avoid and protest against endemic surveillance, USA is rated as one of the 
worst countries in the world as per the 2007 report of 
www.privacyinternational.org : 
http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-559597  ...
USA is not anymore the world flagship for human liberty rights and civilization 
(positive) evolution, its a pain and a pitty.



Re: Any offshore OpenBSD hosting?

2008-06-17 Thread macintoshzoom
You are probably right, this is an issue that have to be checked with the 
network manager of the hosting companies, eventually testing their servers with 
traceroute tools.
The main issue if you want offshore hosting seems to be that you have to verify 
the servers and the datacenters are really located offshore.
I think those are the main  leaking privacy and easiest to snoop points.
Some Panama or India ( https://scorpioinformatics.com/ ) hosting companies are 
proudly advertising they data centers are located in USA ... good for 
performance (if the US datacenter is powerful) but not good for supporting the 
human rights privacy of your customers or good for your philosophical  way of 
thinking.
Malaysian hosting as shinjiru.com have their data center in Kuala Lumpur, but 
perhaps they redirect all traffic via US before going anyway else, I don'T know 
how all this works. Again, traceroute testing required.
This is a very tricky world.
The only easy worldwide solution to the global eavesdroppers problem could be 
to forget http forever and go always for a strong https, ssh2 for other 
protocolos and use always and only gpg over ssl for email. Today CPUs, RAMs and 
bandwith standards allow for this, I think.

Do you know any link(s) about the global traffic maps routing(s)?

macintoshzoom
---
On Tue, 17 Jun 2008 13:28:13 +
[EMAIL PROTECTED] wrote:

  Does anyone knows about any offshore OpenBSD dedicated hosting : Asia, 
  PanamC!, honest and privacy conscious hosting services?
  It seems that as per today it's better to go offshore for a hosting 
  business to avoid and protest against endemic surveillance, USA is rated as 
  one of the worst countries in the world as per the 2007 report of 
  www.privacyinternational.org : 
  http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-559597 
   ...
  USA is not anymore the world flagship for human liberty rights and 
  civilization (positive) evolution, its a pain and a pitty.
 
 So the obvious choice is to go to a country where almost all traffic will 
 pass through the US... A lot of *national* traffic in South America is routed 
 through the US.



Re: Any offshore OpenBSD hosting?

2008-06-17 Thread macintoshzoom
That's a good question.
I will give my 2cents next days.
macintoshzoom

On Tue, 17 Jun 2008 17:51:59 -0300
Rildo Cezar [EMAIL PROTECTED] wrote:

 So, what would be the best country to host a server?

 based on privacy rights.

 Rcmp


 - Original Message -
 From: David Schulz [EMAIL PROTECTED]
 To: macintoshzoom [EMAIL PROTECTED]
 Cc: misc@openbsd.org
 Sent: Tuesday, June 17, 2008 10:28 AM
 Subject: Re: Any offshore OpenBSD hosting?


  Hello,
 
  i have a few Servers with these Guys; http://www.hktechnology.com/ , for a
  few Years, no major Issues.
 
  Mine are FreeBSD, but i would not be surprised if they help you to install
  OpenBSD on a Server for you; they turned out to be helpful in a number of
  Situations for me.
 
  regards,
  David
 
  macintoshzoom wrote:
  Does anyone knows about any offshore OpenBSD dedicated hosting : Asia,
  PanamC!, honest and privacy conscious hosting services?
  It seems that as per today it's better to go offshore for a hosting
  business to avoid and protest against endemic surveillance, USA is rated
  as one of the worst countries in the world as per the 2007 report of
  www.privacyinternational.org :
 
http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-559597
  ...
  USA is not anymore the world flagship for human liberty rights and
  civilization (positive) evolution, its a pain and a pitty.
 
 
  !DSPAM:48579097590355368818224!
 
 
 
  --
  No virus found in this incoming message.
  Checked by AVG. Version: 7.5.524 / Virus Database: 270.3.0/1505 - Release
  Date: 6/16/ 07:20

[demime 1.01d removed an attachment of type application/pgp-signature]



red [EMAIL PROTECTED] homepna 1.0 ?

2008-06-16 Thread macintoshzoom
Anyone knows how to run this usb network system on OpenBSD or Linux?



gnupg to add LDAP - how?

2008-06-13 Thread macintoshzoom
I have gnupg-1.4.8, and KDE KGpg, but no LDAP server support.
It seems that this gnupg has an LDAP flavor, which I miss somehow to
install.

Should I have to uninstall and reinstall gnupg-1.4.8 from the command
line to enable this flavor (a bit of a pain as it is binded with KDE
etc), or is there an easier trick for this?

I want to import to my keyring some public keys available at a private
LDAP server ( ldap://keys.hush.com:389; ).


Thanks.



How to HIDE OpenBSD as user-agent?

2008-04-29 Thread macintoshzoom
How to HIDE OpenBSD as user-agent?

For security reasons it is sometimes interesting to hide GLOBALLLY th
O.S. you are running on AGAINST GIVING ANY CLUE TO HACKERS ABOUT HOW TO
ATTACK YOU.

Not only browsing but globally.

Thanks for any tip about this.



Re: How to HIDE OpenBSD as user-agent?

2008-04-29 Thread macintoshzoom
seen some pf.conf settings against remote OS detection at 
http://nmap.org/misc/defeat-nmap-osdetect.html#OPENBSD:

The OpenBSD packet filter can also be configured to try to defeat remote OS 
Fingerprint..

and  at http://hackepedia.org/?title=Pf :


# block nmap OS detection scans somewhat (-O)
block in quick proto tcp flags FUP/WEUAPRSF
block in quick proto tcp flags WEUAPRSF/WEUAPRSF
block in quick proto tcp flags SRAFU/WEUAPRSF
block in quick proto tcp flags /WEUAPRSF
block in quick proto tcp flags SR/SR
block in quick proto tcp flags SF/SF


Any tips for a full pf.conf settings ?

On Tue, 29 Apr 2008 06:18:38 -0600
macintoshzoom [EMAIL PROTECTED] wrote:

 How to HIDE OpenBSD as user-agent?
 
 For security reasons it is sometimes interesting to hide GLOBALLLY th
 O.S. you are running on AGAINST GIVING ANY CLUE TO HACKERS ABOUT HOW TO
 ATTACK YOU.
 
 Not only browsing but globally.
 
 Thanks for any tip about this.